|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1918 occurrences of 879 keywords
|
|
|
Results
Found 16067 publication records. Showing 16067 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Ahmed Belkhirat, Abdelghani Bouras, Abdelkader Belkhir |
A New Similarity Measure for the Anomaly Intrusion Detection. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
weighted bipartite graph, anomaly detection, similarity measure |
19 | Hyunhee Park, Meejoung Kim, Chul-Hee Kang |
F-TAD: Traffic Anomaly Detection for Sub-networks Using Fisher Linear Discriminant. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
Adaptive defense system, Traffic analysis and measurment, Anomaly detection, Fisher linear discriminant |
19 | Sung Deok Cha, Junsup Lee, Sangrok Kim, Sanghyun Cho |
ADAM: Web Anomaly Detection Assistant Based on Feature Matrix. |
QSIC |
2009 |
DBLP DOI BibTeX RDF |
network security, anomaly detection, web security, web data mining |
19 | Chia-Mei Chen, Wan-Yi Tsai, Hsiao-Chung Lin |
Anomaly Behavior Analysis for Web Page Inspection. |
NetCoM |
2009 |
DBLP DOI BibTeX RDF |
Malicious webpage, Anomaly behavior, Drive-by download |
19 | Li He, Shunzheng Yu, Min Li |
Anomaly Detection Based on Available Bandwidth Estimation. |
NPC Workshops |
2008 |
DBLP DOI BibTeX RDF |
available bandwidth measurement, anomaly detection, active measurement |
19 | Panagiotis Papadimitriou 0002, Ali Dasdan, Hector Garcia-Molina |
Web graph similarity for anomaly detection (poster). |
WWW |
2008 |
DBLP DOI BibTeX RDF |
graph similarity, web graph lsh, anomaly detection |
19 | Christian Callegari, Stefano Giordano, Michele Pagano |
Application of Wavelet Packet Transform to Network Anomaly Detection. |
NEW2AN |
2008 |
DBLP DOI BibTeX RDF |
Best Basis, Anomaly Detection, IDS, Wavelet Packet |
19 | Qi Gao 0004, Feng Qin, Dhabaleswar K. Panda 0001 |
DMTracker: finding bugs in large-scale parallel programs by detecting anomaly in data movements. |
SC |
2007 |
DBLP DOI BibTeX RDF |
parallel programs, anomaly detection, data movements, bug detection |
19 | Michael J. Chapple, Nitesh V. Chawla, Aaron Striegel |
Authentication anomaly detection: a case study on a virtual private network. |
MineNet |
2007 |
DBLP DOI BibTeX RDF |
security, data mining, authentication, anomaly detection, virtual private network |
19 | Anmol Sheth, Christian Doerr, Dirk Grunwald, Richard Han 0001, Douglas C. Sicker |
MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs. |
MobiSys |
2006 |
DBLP DOI BibTeX RDF |
wireless networks, anomaly detection, self-healing |
19 | J. Treurniet |
Detecting low-profile scans in TCP anomaly event data. |
PST |
2006 |
DBLP DOI BibTeX RDF |
distributed scan detection, scan detection, slow scan detection, network security, TCP, anomaly detection |
19 | Dipankar Dasgupta, Senhua Yu, Nivedita Sumi Majumdar |
MILA - multilevel immune learning algorithm and its application to anomaly detection. |
Soft Comput. |
2005 |
DBLP DOI BibTeX RDF |
Humoral immune response, Anomaly detection, Artificial immune systems |
19 | Christoph C. Michael, Anup K. Ghosh |
Simple, state-based approaches to program-based anomaly detection. |
ACM Trans. Inf. Syst. Secur. |
2002 |
DBLP DOI BibTeX RDF |
machine learning, intrusion detection, Anomaly detection, finite automata, information system security |
19 | Alexandr Seleznyov, Oleksiy Mazhelis |
Learning temporal patterns for anomaly intrusion detection. |
SAC |
2002 |
DBLP DOI BibTeX RDF |
anomaly intrusion detection, network security, pattern matching, online learning, behavior profiling |
19 | Christoph C. Michael, Anup K. Ghosh |
Two State-based Approaches to Program-based Anomaly Detection. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
state-based approaches, program-based anomaly detection, intrusion detection algorithms, execution audit data, statistical deviation monitoring, finite state machines, finite-state machine, security of data, software performance evaluation, experimental results, auditing, n-grams, algorithm performance |
19 | Eric L. Miller 0001 |
A scale-recursive, statistically-based method for anomaly characterization in images based upon observations of scattered radiation. |
ICIP |
1995 |
DBLP DOI BibTeX RDF |
electromagnetic wave scattering, terrestrial electricity, geophysical prospecting, statistically-based method, nonlinear scattering model, anomaly characterization, scattered radiation, scale-recursive algorithm, measured fields, estimation-theoretic techniques, decision-theoretic techniques, low-frequency inverse conductivity problem, image processing, statistical analysis, images, decision theory, inverse problems, recursive estimation, geophysical signal processing, geophysical signal processing, Maxwell equations, Maxwell's equation |
14 | Hamza Rahmani, Nabil Sahli, Farouk Kamoun |
Joint Entropy Analysis Model for DDoS Attack Detection. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Feng Gu 0006, Julie Greensmith, Uwe Aickelin |
Exploration of the Dendritic Cell Algorithm Using the Duration Calculus. |
ICARIS |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Shin Ando, Einoshin Suzuki |
Detection of unique temporal segments by information theoretic meta-clustering. |
KDD |
2009 |
DBLP DOI BibTeX RDF |
information-theoretic meta-clustering, temporal data mining |
14 | Zhenyun Zhuang, Ying Li, Zesheng Chen |
PAIDS: A Proximity-Assisted Intrusion Detection System for Unidentified Worms. |
COMPSAC (1) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Hwai-Jung Hsu, Feng-Jian Wang |
Using Artifact Flow Diagrams to Model Artifact Usage Anomalies. |
COMPSAC (2) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Garfield Zhiping Wu, Sylvia L. Osborn, Xin Jin |
Database Intrusion Detection Using Role Profiling with Role Hierarchy. |
Secure Data Management |
2009 |
DBLP DOI BibTeX RDF |
Role profiling, Intrusion detection, RBAC, Database security, Insider threats |
14 | James J. Treinen, Ramakrishna Thurimella |
Finding the Needle: Suppression of False Alarms in Large Intrusion Detection Data Sets. |
CSE (2) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Daisuke Mashima, Mustaque Ahamad |
Using identity credential usage logs to detect anomalous service accesses. |
Digital Identity Management |
2009 |
DBLP DOI BibTeX RDF |
identity theft and misuse detection, online access log monitoring, risk scoring |
14 | Wei Lu 0018, Hengjian Tong |
Detecting Network Anomalies Using CUSUM and EM Clustering. |
ISICA |
2009 |
DBLP DOI BibTeX RDF |
clustering, Intrusion detection |
14 | Haakon Ringberg, Augustin Soule, Jennifer Rexford |
WebClass: adding rigor to manual labeling of traffic anomalies. |
Comput. Commun. Rev. |
2008 |
DBLP DOI BibTeX RDF |
database, data sharing, network traffic analysis, data labeling |
14 | Claudio Piciarelli, Christian Micheloni, Gian Luca Foresti |
Trajectory-Based Anomalous Event Detection. |
IEEE Trans. Circuits Syst. Video Technol. |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Vandana Pursnani Janeja, Vijayalakshmi Atluri |
Random Walks to Identify Anomalous Free-Form Spatial Scan Windows. |
IEEE Trans. Knowl. Data Eng. |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Jan Feyereisl, Uwe Aickelin |
ToLeRating UR-STD. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Udayan Deshpande, Chris McDonald, David Kotz |
Refocusing in 802.11 Wireless Measurement. |
PAM |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Jianning Mai, Lihua Yuan, Chen-Nee Chuah |
Detecting BGP anomalies with wavelet. |
NOMS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Ping Du, Shunji Abe, Yusheng Ji, Seisho Sato, Makio Ishiguro |
Detecting and Tracing Traffic Volume Anomalies in SINET3 Backbone Network. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Syed A. Khayam, Hayder Radha, Dmitri Loguinov |
Worm Detection at Network Endpoints Using Information-Theoretic Traffic Perturbations. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Zhengdao Zhang, Zhumiao Peng, Zhiping Zhou |
The Study of Intrusion Prediction Based on HsMM. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Arun Vishwanath, Vijay Sivaraman |
Routers With Very Small Buffers: Anomalous Loss Performance for Mixed Real-Time and TCP Traffic. |
IWQoS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho, Xiaodong Lin 0001 |
RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Paramvir Bahl, Ranveer Chandra, Patrick P. C. Lee, Vishal Misra, Jitendra Padhye, Dan Rubenstein, Yan Yu |
Opportunistic use of client repeaters to improve performance of WLANs. |
CoNEXT |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Nan Zhang 0004, Wei Yu 0002, Xinwen Fu, Sajal K. Das 0001 |
Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation. |
ICPADS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Tie-Shan Zhao, Zeng-zhi Li, Ze-ming Wang, Xiaofen Lin |
An Approach to Model Normal Network Behaviors Based on Entire Network Packets. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Said Mirza Pahlevi, Isao Kojima |
Semantic grid resource monitoring and discovery with rule processing based on the time-series statistical data. |
GRID |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji |
The Evolution of System-Call Monitoring. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Vincent S. Tseng, Lee-Cheng Chen, Chao-Hui Lee, Jin-Shang Wu, Yu-Chia Hsu |
Development of a Vital Sign Data Mining System for Chronic Patient Monitoring. |
CISIS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Stéphane P. A. Bordas, James G. Conley, Brian Moran, Joe Gray, Ed Nichols |
A simulation-based design paradigm for complex cast components. |
Eng. Comput. |
2007 |
DBLP DOI BibTeX RDF |
Casting design and modeling, Extended finite element method, XFEM, Crack growth and damage tolerance analysis, Non-destructive evaluation, Industrial problems, Micro-macro simulations |
14 | Oleg Kuybeda, David Malah, Meir Barzohar |
Rank Estimation and Redundancy Reduction of High-Dimensional Noisy Signals With Preservation of Rare Vectors. |
IEEE Trans. Signal Process. |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit |
Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection. |
ECBS |
2007 |
DBLP DOI BibTeX RDF |
|
14 | David Pérez-Díaz De Cerio, José Luis Valenzuela |
Perceptual Evaluation and Enhancement of VoIP Over IEEE 802.11e. |
VTC Spring |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Thomas Stibor, Jonathan Timmis |
Comments on real-valued negative selection vs. real-valued positive selection and one-class SVM. |
IEEE Congress on Evolutionary Computation |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Katja Luther, Rainer Bye, Tansu Alpcan, Achim Müller, Sahin Albayrak |
A Cooperative AIS Framework for Intrusion Detection. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Elisa Bertino, Ashish Kamra, James P. Early |
Profiling Database Application to Detect SQL Injection Attacks. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Hilmi Günes Kayacik, Malcolm I. Heywood, Nur Zincir-Heywood |
Evolving Buffer Overflow Attacks with Detector Feedback. |
EvoWorkshops |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Birger Tödtmann, Stephan Riebach, Erwin P. Rathgeb |
The Honeynet Quarantine: Reducing Collateral Damage Caused by Early Intrusion Response. |
ICN |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Federico Maggi, Stefano Zanero |
On the Use of Different Statistical Tests for Alert Correlation - Short Paper. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Hongli Luo, Mei-Ling Shyu |
Differentiated Service Protection of Multimedia Transmission via Detection of Traffic Anomalies. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Hongli Luo, Mei-Ling Shyu |
Defense against Bandwidth Attacks with Traffic Resource Management. |
IRI |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Pin Lu, Kai Shen |
Multi-Layer Event Trace Analysis for Parallel I/O Performance Tuning. |
ICPP |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Sun Yong Kim, Miyuki Imada, Masakatsu Ohta |
Detecting Anomalous Events in Ubiquitous Sensor Environments using Bayesian Networks and Nonparametric Regression. |
AINA |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Jianning Mai, Ashwin Sridharan, Chen-Nee Chuah, Hui Zang, Tao Ye |
Impact of Packet Sampling on Portscan Detection. |
IEEE J. Sel. Areas Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Eamonn J. Keogh, Jessica Lin 0001, Ada Wai-Chee Fu, Helga Van Herle |
Finding Unusual Medical Time-Series Subsequences: Algorithms and Applications. |
IEEE Trans. Inf. Technol. Biomed. |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Yacine Bouzida, Frédéric Cuppens |
Detecting Known and Novel Network Intrusions. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Soon Tee Teoh, Supranamaya Ranjan, Antonio Nucci, Chen-Nee Chuah |
BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
visualization, routing, network security, BGP |
14 | Wei Wang 0012, Roberto Battiti |
Identifying Intrusions in Computer Networks with Principal Component Analysis. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Jianyun Xu, Andrew H. Sung, Qingzhong Liu |
Tree Based Behavior Monitoring for Adaptive Fraud Detection. |
ICPR (1) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Xinguang Peng, Junfeng Zhang |
Program Detection with Context Dependency for Collaborative Services. |
CSCWD |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani Thuraisingham |
Detection and Resolution of Anomalies in Firewall Policy Rules. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
Network Security, Security Policy, Firewalls, Anomalies, Packet Filters |
14 | Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai |
Actively Modifying Control Flow of Program for Efficient Anormaly Detection. |
KES (2) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Gregory R. Madey, Gábor Szabó 0002, Albert-László Barabási |
WIPER: The Integrated Wireless Phone Based Emergency Response System. |
International Conference on Computational Science (3) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Chung-Ju Wu, Sheng-Yuan Chen, Jenq Kuen Lee |
Copy Propagation Optimizations for VLIW DSP Processors with Distributed Register Files. |
LCPC |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Yao Wang, Ming-Zeng Hu, Bin Li, Bo-Ru Yan |
Tracking Anomalous Behaviors of Name Servers by Mining DNS Traffic. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Kyubum Wee, Sinjae Kim |
Construction of Finite Automata for Intrusion Detection from System Call Sequences by Genetic Algorithms. |
PAKDD |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Zonghua Zhang, Hong Shen 0001 |
Constructing Multi-Layered Boundary to Defend Against Intrusive Anomalies: An Autonomic Detection Coordinator. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Vandana Pursnani Janeja, Vijayalakshmi Atluri |
FS3: A Random Walk Based Free-Form Spatial Scan Statistic for Anomalous Window Detection. |
ICDM |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Dongyong Yang, Jungan Chen |
The T-detectors maturation algorithm based on match range model. |
SAC |
2005 |
DBLP DOI BibTeX RDF |
T-cells maturation, match range, negative selection |
14 | Rosario Giuseppe Garroppo, Stefano Giordano, Stefano Lucetti, Luca Tavanti |
Achieving Flow Isolation in 802.11 Networks with the DTT Scheduler. |
EuroNGI Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Stefano Zanero |
Analyzing TCP Traffic Patterns Using Self Organizing Maps. |
ICIAP |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Zoltán Porkoláb, István Zólyomi |
A Feature Composition Problem and a Solution Based on C++ Template Metaprogramming. |
GTTSE |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Bruce D. Caulkins, Joohan Lee, Morgan C. Wang |
Packet- vs. Session-Based Modeling for Intrusion Detection Systems. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Yiru Li, Anil Somayaji |
Securing Email Archives through User Modeling. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
14 | David Whyte, Paul C. van Oorschot, Evangelos Kranakis |
Detecting Intra-enterprise Scanning Worms based on Address Resolution. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Tianrui Li 0001, Wuming Pan |
Intrusion detection system based on new association rule mining model. |
GrC |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Nong Ye, Yebin Zhang, Connie M. Borror |
Robustness of the Markov-chain model for cyber-attack detection. |
IEEE Trans. Reliab. |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Fernando Godínez, Dieter Hutter, Raúl Monroy |
Attribute Reduction for Effective Intrusion Detection. |
AWIC |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Brian D. Carrier, Blake Matheny |
Methods for Cluster-Based Incident Detection. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Ke Zhang 0026, Amy Yen, Xiaoliang Zhao, Daniel Massey, Shyhtsun Felix Wu, Lixia Zhang 0001 |
On Detection of Anomalous Routing Dynamics in BGP. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Ehab Al-Shaer |
Managing firewall and network-edge security policies. |
NOMS (1) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Christophe Mues, Jan Vanthienen |
Improving the Scalability of Rule Base Verification Using Binary Decision Diagrams: An Empirical Study. |
KI |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Christophe Mues, Jan Vanthienen |
Efficient Rule Base Verification Using Binary Decision Diagrams. |
DEXA |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Zhenhe Guo, Zhengkai Liu, Ying Tan 0002 |
An NN-Based Malicious Executables Detection Algorithm Based on Immune Principles. |
ISNN (2) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Anelise Munaretto, Mauro Fonseca, Khaldoun Al Agha, Guy Pujolle |
Fair Time Sharing Protocol: A Solution for IEEE 802.11b Hot Spots. |
ICT |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo |
N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | P. Ramasubramanian, Arputharaj Kannan |
Intelligent Multi-agent Based Database Hybrid Intrusion Prevention System. |
ADBIS |
2004 |
DBLP DOI BibTeX RDF |
Quickprop Prediction Technique, Neural Networks, Multi-Agents, Database Security |
14 | Joshua Oldmeadow, Siddarth Ravinutala, Christopher Leckie |
Adaptive Clustering for Network Intrusion Detection. |
PAKDD |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Armando Fox, Emre Kiciman, David A. Patterson 0001 |
Combining statistical monitoring and predictable recovery for self-management. |
WOSS |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Dongyong Yang, Jungan Chen |
The T-Detectors Maturation Algorithm Based on Genetic Algorithm. |
Australian Conference on Artificial Intelligence |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Dina Q. Goldin, Ayferi Kutlu, Mingjun Song, Fuzheng Yang |
The Constraint Database Framework: Lessons Learned from CQA/CDB. |
ICDE |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Bharat K. Bhargava, Yuhui Zhong, Yunhua Lu |
Fraud Formalization and Detection. |
DaWaK |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Yi-an Huang, Wei Fan 0001, Wenke Lee, Philip S. Yu |
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. |
ICDCS |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Derek Armstrong, Sam Carter, Gregory L. Frazier, Tiffany M. Frazier |
A Controller-Based Autonomic Defense System. |
DISCEX (2) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Ruo Ando, Yoshiyasu Takefuji |
Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy. |
MMM-ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Shambhu J. Upadhyaya |
Real-Time Intrusion Detection with Emphasis on Insider Attacks. |
MMM-ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Tsuyoshi Ohta, Hideto Kinoshita, Takahiro Kimata, Tadanori Mizuno |
A Framework of an Assertion-Based Algorithmic Debugging for Distributed Programs. |
ICOIN |
2001 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #600 of 16067 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|